IT Management  >   Systems Operations  >  

Systems Security

RSS Feed   
Systems Security Reports
 
How to Modernize Your Vulnerability Management Program
sponsored by ServiceNow
EGUIDE: Attackers have changed their focus from servers to users. As a result, security professionals should refrain from security strategy complacency, especially when it comes to their vulnerability management programs. In this e-guide, learn how to modernize your vulnerability management program to protect your organization and users.
Posted: 24 Oct 2019 | Published: 22 Oct 2019

ServiceNow

Malicious Cryptomining Moves Mainstream
sponsored by Cisco Umbrella
EBOOK: The threat of malicious cryptomining will continue to grow. If you’re not protected, it can cost you in all kinds of ways. Find out how to protect your network and your valuable resources in this e-book.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

Cisco Umbrella

Securing Your SWIFT Environment Using Micro-Segmentation
sponsored by Illumio
WHITE PAPER: All SWIFT customers must self-attest to their compliance with the SWIFT Customer Security Program (CSP). The program is designed to respond to the wave of cybercrime targeting SWIFT installations. In this white paper, explore 3 challenges that prove especially difficult for SWIFT customers looking to achieve compliance.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

Illumio

How to Improve Your Security Incident Response Process
sponsored by ServiceNow
EGUIDE: Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

Building a Strong and Effective Incident Response Plan
sponsored by ServiceNow
EGUIDE: Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
Posted: 28 Oct 2019 | Published: 23 Oct 2019

ServiceNow

CW Benelux November 2019-January 2020: Dutch banks fight money laundering
sponsored by ComputerWeekly.com
EZINE: Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.
Posted: 24 Oct 2019 | Published: 31 Oct 2019

ComputerWeekly.com

DevSecOps delivers better business
sponsored by ComputerWeekly.com
EGUIDE: Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

ComputerWeekly.com

KuppingerCole Report Leadership Compass Database and Big Data Security
sponsored by IBM
ANALYST REPORT: This Leadership Compass from analyst firm KuppingerCole provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection products that best meet client’s requirements.
Posted: 24 Oct 2019 | Published: 30 Jun 2019

IBM

OnDemnd Webinar: Up, Up and Away! Best Practices for Securing Data in Hybrid Multi-Cloud Environments
sponsored by IBM
WEBCAST: Your data is moving to the cloud – that’s a given – but will it be safe once it gets there? The new reality of a hybrid, multi-cloud world complicates data protection efforts for organizations everywhere, as do new privacy and compliance mandates. In this webinar, learn how to integrate data security into your cloud strategy.
Posted: 28 Oct 2019 | Premiered: Oct 28, 2019

IBM

5 Epic Fails in Data Security
sponsored by IBM
WHITE PAPER: This paper looks at 5 of the most prevalent – and avoidable – data security missteps organizations are making today, and how these "epic fails" open them up to potentially disastrous attacks. Read on to see if your organization's data security practices are sound enough to face the pressure of today's threat landscape.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement